HomeSort by relevance Sort by last modified time
    Searched full:selinux (Results 701 - 725 of 1108) sorted by null

<<21222324252627282930>>

  /external/selinux/policycoreutils/gui/
loginsPage.py 1 ## loginsPage.py - show selinux mappings
58 col = gtk.TreeViewColumn(_("SELinux\nUser"), gtk.CellRendererText(), text=1)
polgengui.py 3 # polgengui.py - GUI for SELinux Config tool in system-config-selinux
74 gnome.program_init("SELinux Policy Generation Tool", "5")
78 sys.path.append('/usr/share/system-config-selinux')
93 xml = gtk.glade.XML("/usr/share/system-config-selinux/polgen.glade", domain=PROGNAME)
    [all...]
portsPage.py 1 ## portsPage.py - show selinux mappings
87 col = gtk.TreeViewColumn(_("SELinux Port\nType"), gtk.CellRendererText(), text=TYPE_COL)
system-config-selinux.glade 11 <property name="name" translatable="yes">system-config-selinux</property>
18 <property name="logo">system-config-selinux.png</property>
22 <property name="title" translatable="yes">Add SELinux Login Mapping</property>
128 <property name="label" translatable="yes">SELinux User</property>
257 <property name="title" translatable="yes">Add SELinux Network Ports</property>
391 <property name="label" translatable="yes">SELinux Type</property>
544 <property name="title" translatable="yes">Add SELinux Login Mapping</property>
678 <property name="label" translatable="yes">SELinux Type</property>
837 <property name="title" translatable="yes">Add SELinux User</property>
    [all...]
  /external/selinux/policycoreutils/semanage/
semanage-bash-completion.sh 28 dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1
55 dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1
  /external/selinux/prebuilts/bin/
sesearch.py 27 description="SELinux policy rule search tool.",
30 parser.add_argument("policy", help="Path to the SELinux policy to search.", nargs="?")
  /system/core/adb/daemon/
main.cpp 36 #include "selinux/android.h"
148 LOG(FATAL) << "Could not set SELinux context";
  /system/core/run-as/
run-as.c 37 #include <selinux/android.h>
195 panic("Could not set SELinux security context: %s\n", strerror(errno));
  /external/dbus/cmake/
CMakeLists.txt 277 #AC_ARG_ENABLE(selinux, AS_HELP_STRING([--enable-selinux],[build with SELinux support]),enable_selinux=$enableval,enable_selinux=auto)
278 #selinux missing
556 #message(" Building SELinux support: ${have_selinux} ")
  /system/sepolicy/
domain.te 125 # toybox loads libselinux which stats /sys/fs/selinux/
189 # No domain needs mac_override as it is unused by SELinux.
195 # Only init should be able to load SELinux policies.
201 # Only init and the system_server can set selinux.reload_policy 1
252 # triggered, it's probably due to a service with no SELinux domain.
init.te 133 # Reload policy upon setprop selinux.reload_policy 1.
220 # Perform SELinux access checks on setting properties.
  /external/selinux/policycoreutils/audit2allow/
audit2allow 33 import selinux.audit2why as audit2why namespace
92 help="Translates SELinux audit messages into a description of why the access was denied")
242 import selinux namespace
audit2why 33 import selinux.audit2why as audit2why namespace
92 help="Translates SELinux audit messages into a description of why the access was denied")
242 import selinux namespace
  /frameworks/base/core/java/com/android/internal/content/
NativeLibraryHelper.java 35 import android.os.SELinux;
278 } else if (!SELinux.restorecon(path)) {
279 throw new IOException("Cannot set SELinux context for " + path.getPath());
  /system/core/adb/
file_sync_service.cpp 25 #include <selinux/android.h>
75 // Not all filesystems support setting SELinux labels. http://b/23530370.
176 // Not all filesystems support setting SELinux labels. http://b/23530370.
  /cts/tests/tests/permission/src/android/permission/cts/
FileSystemPermissionTest.java 716 new File("/sys/fs/selinux/member"),
717 new File("/sys/fs/selinux/user"),
718 new File("/sys/fs/selinux/relabel"),
719 new File("/sys/fs/selinux/create"),
720 new File("/sys/fs/selinux/access"),
721 new File("/sys/fs/selinux/context")
    [all...]
  /external/dbus/bus/
bus.c 36 #include "selinux.h"
655 * inotify, connections to SELinux, etc.
917 bus_context_log (context, DBUS_SYSTEM_LOG_FATAL, "SELinux enabled but AVC initialization failed; check system log\n");
    [all...]
  /docs/source.android.com/src/security/authentication/
fingerprint-hal.jd 128 an SELinux policy. That is, the Serial Peripheral Interface (SPI) channel must
129 be accessible only to the TEE, and there must be an explicit SELinux policy on
  /external/libselinux/utils/
sefcontext_compile.c 12 #include <selinux/selinux.h>
  /external/selinux/libselinux/src/
label.c 14 #include <selinux/selinux.h>
  /external/selinux/libselinux/utils/
sefcontext_compile.c 12 #include <selinux/selinux.h>
  /external/selinux/secilc/docs/
cil_file_labeling_statements.md 107 Label filesystems that support SELinux security contexts.
131 <li><p><code>xattr</code> - Filesystems supporting the extended attribute <code>security.selinux</code>. The labeling is persistent for filesystems that support extended attributes.</p></li>
  /cts/tests/tests/security/src/android/security/cts/
HwRngTest.java 116 // This can occur because SELinux blocked stat access on the device nodes.
  /developers/build/templates/create/
template-params.xml.ftl 74 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->
  /developers/samples/android/wearable/wear/SpeedTracker/
template-params.xml 81 be used sparingly. (e.g. VPN clients, SELinux, custom instrumentation runners) -->

Completed in 704 milliseconds

<<21222324252627282930>>